Sciweavers

575 search results - page 64 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
NCA
2003
IEEE
14 years 1 months ago
A Study of Providing Statistical QoS in a Differentiated Sevices Network
In this paper, we propose and analyze a methodology for providing statistical guarantees within the diffserv model in a network, that uses static-priority schedulers. We extend th...
Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Z...
WWW
2008
ACM
14 years 8 months ago
Social and semantics analysis via non-negative matrix factorization
Social media such as Web forum often have dense interactions between user and content where network models are often appropriate for analysis. Joint non-negative matrix factorizat...
Zhi-Li Wu, Chi-Wa Cheng, Chun-hung Li
TSMC
2008
119views more  TSMC 2008»
13 years 7 months ago
An Efficient Binary-Decision-Diagram-Based Approach for Network Reliability and Sensitivity Analysis
Abstract--Reliability and sensitivity analysis is a key component in the design, tuning, and maintenance of network systems. Tremendous research efforts have been expended in this ...
Liudong Xing
ACMSE
2006
ACM
14 years 1 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...